Source |
Global Security Mag |
Identifiant |
8306566 |
Date de publication |
2023-02-02 12:59:06 (vue: 2023-02-02 13:07:56) |
Titre |
MalVirt | .NET virtualisation thrives in new malvertising attacks |
Texte |
While investigating recent malvertising (malicious advertising) attacks, SentinelLabs spotted a cluster of virtualised malware loaders that has joined the trend. Referred to as MalVirt, the loaders are implemented in .NET and use virtualisation, based on the KoiVM virtualising protector of .NET applications, in order to obfuscate their implementation and execution. Although virtualisation is popular for hacking tools and cracks, the use of KoiVM virtualisation is not often seen as an obfuscation method utilised by cybercrime threat actors.
-
Malware Update |
Notes |
★★
|
Envoyé |
Oui |
Condensat |
actors advertising although and applications are attacks based cluster cracks cybercrime execution for hacking has implementation implemented investigating joined koivm loaders malicious malvertising malvirt malware method net new not obfuscate obfuscation often order popular protector recent referred seen sentinellabs spotted that the their threat thrives tools trend update use utilised virtualisation virtualised virtualising while |
Tags |
Malware
Threat
|
Stories |
|
Move |
|